問題一覧
1
- Inject malicious scripts into web pages viewed by other users
2
- In the recommendations section
3
- NIST's Cybersecurity Framework
4
- Fast flux DNS is being used for an attacker's C2
5
- Conduct an OS fingerprinting scan across the network
6
- Security Onion
7
- secpol.msc
8
- NDA
9
- Investigate and prioritize the vulnerability based on its potential impact on the affected hosts
10
- By creating bureaucratic delays in implementing necessary patches and updates
11
- Supplemented
12
- Zero-day vulnerability
13
- DKIM
14
- Legal and regulatory issues may prevent data migration to the cloud
15
- Integer overflow attack
16
- Contact the vendor to provide an update or to remediate the vulnerability
17
- An attempted connection to the telnet service was prevented, - The packet was blocked inbound to the network
18
- Directing traffic to internal services if the contents of the traffic comply with the policy
19
- Deploy a new group policy
20
- 37.259.129.207
21
- Defense in depth
22
- Integrity
23
- The laptop should be physically inspected and compared with images made before you left, - The laptop should be scanned for malware
24
- Require two-factor authentication for access to the application, - Whitelist all specific IP blocks that use this application, - Change the username and default password
25
- Allows for measurable evaluation of the effectiveness of the vulnerability management process
26
- Privacy breach
27
- Management, - Legal, - Public relations, - Human resources
28
- Potential Reverse Shell
29
- Installation
30
- Only an approved scanning vendor
31
- A compensating control
32
- eFUSE
33
- Perform a cryptographic erase (CE) on the storage devices
34
- Metasploit
35
- Containment, eradication, and recovery
36
- Forensic analysis
37
- Brute force
38
- Dual control authentication
39
- Base64
40
- XML injection, - SQL injection, - Directory traversal, - Cross-site scripting
41
- Increase individual accountability
42
- To measure the effectiveness of the vulnerability management program
43
- By making it difficult for the organization to fully comprehend and address system vulnerabilities
44
- MITRE ATT&CK
45
- Prioritize vulnerabilities by both CVSS score and the criticality of the affected systems
46
- MITRE ATT&CK framework
47
- Cyber Kill Chain
48
- To provide alternative security measures when a primary control is not feasible
49
- No manufacturer support means no access to necessary patches or updates for fixing vulnerabilities.
50
- find /var/log/ -exec grep -H -e "[Tt]erri" {} \; 2> /dev/null
51
- Developed
52
- Zero-day
53
- John does not have permission to perform the scan
54
- It helps manage legal risk and public perception of the incident
55
- PII
56
- XSS
57
- Tools
58
- CPU cache, RAM, Swap, Hard drive
59
- nmap
60
- Cross-site scripting
61
- Conduct notification to all affected customers within 72 hours of the discovery of the breach
62
- Data minimization
63
- Chained exploit
64
- Prefetch is enabled on the analyst’s web browser
65
- Configure a virtual switch on the physical server and create VLANs
66
- Low
67
- Discover servers facing the public internet, - Harvest email addresses, - Identify employees on Social Media networks
68
- Privilege escalation
69
- An uncredentialed scan of the network was performed
70
- Penetration test
71
- SaaS in a private cloud
72
- \b(192\.168\.66\.6)|(10\.66\.6\.10)|(172\.16\.66\.1)\b
73
- Separation of duties
74
- \b[A-Za-z0-9\.\-]{50,251}+\.org
75
- Lateral Movement
76
- Tabletop exercises
77
- SPI
78
- Someone used an SQL injection to assign straight A's to the student with ID #1235235
79
- Active scanning engine installed on the enterprise console
80
- Change sshd_config to deny root login
81
- NAC
82
- Lessons learned
83
- All guests must provide valid identification when registering their wireless devices for use on the network
84
- 10.0.19.121 is a client that is accessing an SSH server over port 52497
85
- Notify your CSIRT and cooperate with them to protect the company's sensitive data
86
- It ensures that the organization maintains compliance with required security standards and protocols
87
- Exploitation
88
- May lead to delays in performing system maintenance and patching
89
- Sanitization
90
- These types of vulnerabilities pose the highest risk to the environment
THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T: 1 CHRONICLE: ( ex.9 )
THE P.T: 1 CHRONICLE: ( ex.9 )
90問 • 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
The R.S.S.H Delivery Company · 88問 · 6ヶ月前THE P.T: 2 CHRONICLE: ( ex.10 )
THE P.T: 2 CHRONICLE: ( ex.10 )
88問 • 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
The R.S.S.H Delivery Company · 89問 · 6ヶ月前THE P.T. 3: CHRONICLE: ( ex.12 )
THE P.T. 3: CHRONICLE: ( ex.12 )
89問 • 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
The R.S.S.H Delivery Company · 52問 · 6ヶ月前THE P.T. 4: CHRONICLE: ( ex.11 )
THE P.T. 4: CHRONICLE: ( ex.11 )
52問 • 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
The R.S.S.H Delivery Company · 92問 · 6ヶ月前THE P.T. 5: CHRONICLE: ( ex.13 )
THE P.T. 5: CHRONICLE: ( ex.13 )
92問 • 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
The R.S.S.H Delivery Company · 90問 · 6ヶ月前THE P.T. 6: CHRONICLE: ( ex.14 )
THE P.T. 6: CHRONICLE: ( ex.14 )
90問 • 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
The R.S.S.H Delivery Company · 48問 · 6ヶ月前THE P.T. 7: ( ex.15 )
THE P.T. 7: ( ex.15 )
48問 • 6ヶ月前EXAM #1 |
EXAM #1 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #1 |
EXAM #1 |
90問 • 7ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
The R.S.S.H Delivery Company · 5問 · 9ヶ月前1 ) Identify Security Control Types
1 ) Identify Security Control Types
5問 • 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
The R.S.S.H Delivery Company · 8問 · 9ヶ月前2 ) Threat Intelligence
2 ) Threat Intelligence
8問 • 9ヶ月前EXAM #2 |
EXAM #2 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM #2 |
EXAM #2 |
90問 • 7ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
The R.S.S.H Delivery Company · 17問 · 9ヶ月前3 ) Classifying Threats
3 ) Classifying Threats
17問 • 9ヶ月前EXAM # 3 |
EXAM # 3 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 3 |
EXAM # 3 |
90問 • 7ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
The R.S.S.H Delivery Company · 16問 · 9ヶ月前4 ) Threat Hunting
4 ) Threat Hunting
16問 • 9ヶ月前EXAM # 4 |
EXAM # 4 |
The R.S.S.H Delivery Company · 90問 · 7ヶ月前EXAM # 4 |
EXAM # 4 |
90問 • 7ヶ月前5 ) Network Forensics
5 ) Network Forensics
The R.S.S.H Delivery Company · 9問 · 9ヶ月前5 ) Network Forensics
5 ) Network Forensics
9問 • 9ヶ月前問題一覧
1
- Inject malicious scripts into web pages viewed by other users
2
- In the recommendations section
3
- NIST's Cybersecurity Framework
4
- Fast flux DNS is being used for an attacker's C2
5
- Conduct an OS fingerprinting scan across the network
6
- Security Onion
7
- secpol.msc
8
- NDA
9
- Investigate and prioritize the vulnerability based on its potential impact on the affected hosts
10
- By creating bureaucratic delays in implementing necessary patches and updates
11
- Supplemented
12
- Zero-day vulnerability
13
- DKIM
14
- Legal and regulatory issues may prevent data migration to the cloud
15
- Integer overflow attack
16
- Contact the vendor to provide an update or to remediate the vulnerability
17
- An attempted connection to the telnet service was prevented, - The packet was blocked inbound to the network
18
- Directing traffic to internal services if the contents of the traffic comply with the policy
19
- Deploy a new group policy
20
- 37.259.129.207
21
- Defense in depth
22
- Integrity
23
- The laptop should be physically inspected and compared with images made before you left, - The laptop should be scanned for malware
24
- Require two-factor authentication for access to the application, - Whitelist all specific IP blocks that use this application, - Change the username and default password
25
- Allows for measurable evaluation of the effectiveness of the vulnerability management process
26
- Privacy breach
27
- Management, - Legal, - Public relations, - Human resources
28
- Potential Reverse Shell
29
- Installation
30
- Only an approved scanning vendor
31
- A compensating control
32
- eFUSE
33
- Perform a cryptographic erase (CE) on the storage devices
34
- Metasploit
35
- Containment, eradication, and recovery
36
- Forensic analysis
37
- Brute force
38
- Dual control authentication
39
- Base64
40
- XML injection, - SQL injection, - Directory traversal, - Cross-site scripting
41
- Increase individual accountability
42
- To measure the effectiveness of the vulnerability management program
43
- By making it difficult for the organization to fully comprehend and address system vulnerabilities
44
- MITRE ATT&CK
45
- Prioritize vulnerabilities by both CVSS score and the criticality of the affected systems
46
- MITRE ATT&CK framework
47
- Cyber Kill Chain
48
- To provide alternative security measures when a primary control is not feasible
49
- No manufacturer support means no access to necessary patches or updates for fixing vulnerabilities.
50
- find /var/log/ -exec grep -H -e "[Tt]erri" {} \; 2> /dev/null
51
- Developed
52
- Zero-day
53
- John does not have permission to perform the scan
54
- It helps manage legal risk and public perception of the incident
55
- PII
56
- XSS
57
- Tools
58
- CPU cache, RAM, Swap, Hard drive
59
- nmap
60
- Cross-site scripting
61
- Conduct notification to all affected customers within 72 hours of the discovery of the breach
62
- Data minimization
63
- Chained exploit
64
- Prefetch is enabled on the analyst’s web browser
65
- Configure a virtual switch on the physical server and create VLANs
66
- Low
67
- Discover servers facing the public internet, - Harvest email addresses, - Identify employees on Social Media networks
68
- Privilege escalation
69
- An uncredentialed scan of the network was performed
70
- Penetration test
71
- SaaS in a private cloud
72
- \b(192\.168\.66\.6)|(10\.66\.6\.10)|(172\.16\.66\.1)\b
73
- Separation of duties
74
- \b[A-Za-z0-9\.\-]{50,251}+\.org
75
- Lateral Movement
76
- Tabletop exercises
77
- SPI
78
- Someone used an SQL injection to assign straight A's to the student with ID #1235235
79
- Active scanning engine installed on the enterprise console
80
- Change sshd_config to deny root login
81
- NAC
82
- Lessons learned
83
- All guests must provide valid identification when registering their wireless devices for use on the network
84
- 10.0.19.121 is a client that is accessing an SSH server over port 52497
85
- Notify your CSIRT and cooperate with them to protect the company's sensitive data
86
- It ensures that the organization maintains compliance with required security standards and protocols
87
- Exploitation
88
- May lead to delays in performing system maintenance and patching
89
- Sanitization
90
- These types of vulnerabilities pose the highest risk to the environment